Month: September 2018

Do you have control of your Office 365 data? Do you have access to all the items you need? The knee-jerk reaction is typically, “Of course I do,” or “Microsoft takes care of it all.” But if you really think about it — are you sure? Microsoft takes care of quite a bit, and provides a great service for their customers. However, Microsoft’s primary focus is on managing the Office 365 infrastructure and maintaining uptime to your users. They are empowering YOU with the responsibility of your data. The misconception that Microsoft fully backs up your data on your behalf is quite common, and without a shift in mindset, could have damaging repercussions when this responsibility is left unattended. Ultimately, you need to ensure you have access to, and control over, your Exchange Online, SharePoint Online and OneDrive for Business data.

The misunderstanding falls between Microsoft’s perceived responsibility and the user’s actual responsibility of protection and long-term retention of their Office 365 data. The backup and recoverability that Microsoft provides and what users assume they are getting are often different. Meaning, aside from the standard precautions Office 365 has in place, you may need to re-assess the level of control you have of your data and how much access you truly have to it.

Microsoft Office 365 offers geo redundancy, which is often mistaken for backup. Backup takes place when a historical copy of data is made and then stored in another location. However, it is even more important that you have direct access to and control over that backup. So if data is lost, accidentally deleted or maliciously attacked, for example — you can quickly recover. Geo redundancy, on the other hand, protects against site or hardware failure, so if there is an infrastructure crash or outage, your users will remain productive and often oblivious to these underlying issues.

6 reasons why backing up Office 365 is critical:

Accidental Deletion

Retention policy gaps and confusion

Internal security threats

External security threats

Legal and compliance requirements

Managing hybrid deployments

Go ahead and take a closer look. There are security gaps you may not have been aware of before. You already made a smart business decision by deploying Microsoft Office 365, now find a backup solution that offers you both complete access and complete control of your Office 365 data and avoid the unnecessary risks of data loss. To learn more, reach out to your Keller Schroeder Select Account Manager.

Most small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought given to the security of the computer networks these processes depend on. After all, they’re just the little guy – why would hackers go to the trouble of penetrating their systems for the minuscule amount of data they store? And eventually, often after years of smooth sailing through calm seas, they get hacked, fork out thousands of dollars to malicious hackers and collapse beneath the weight of their own shortsightedness.

The facts don’t lie. According to Verizon’s annual Data Breach Investigations Report, a full 71% of cyber-attacks are aimed squarely at SMBs. And while it’s unclear exactly how many of these attacks are actually successful, with the sad state of most small businesses’ security protocols, it’s a safe bet that a good chunk of the attacks make it through. But why? As Tina Manzer writes for Educational Dealer, “Size becomes less of an issue than the security network … While larger enterprises typically have more data to steal, small businesses have less secure networks.” As a result, hackers can hook up automated strikes to lift data from thousands of small businesses at a time – the hit rate is that high.

Today, trusting the security of your company to your son-in-law, who assures you he “knows about computers,” isn’t enough. It takes constant vigilance, professional attention and, most of all, knowledge. Start here with the four most common ways hackers infiltrate hapless small businesses.

PHISHING E-MAILS

An employee receives an e-mail directly from your company’s billing company, urging them to fill out some “required” information before their paycheck can be finalized. Included in the very professional-looking e-mail is a link your employee needs to click to complete the process. But when they click the link, they aren’t redirected anywhere. Instead, a host of vicious malware floods their system, spreading to the entirety of your business network within seconds, and locks everyone out of their most precious data. In return, the hackers want thousands of dollars or they’ll delete everything.

It’s one of the oldest tricks in the hacker toolbox, but today it’s easier than ever for an attacker to gather key information and make a phishing e-mail look exactly like every other run-of-the-mill e-mail you receive each day. Train your employees to recognize these sneaky tactics, and put in safeguards in case someone messes up and clicks the malicious link.

BAD PASSWORDS

According to Inc.com contributing editor John Brandon, “With a $300 graphics card, a hacker can run 420 billion simple, lowercase, eight-character password combinations a minute.” What’s more, he says, “80% of cyber-attacks involve weak passwords,” yet despite this fact, “55% of people use one password for all logins.”

As a manager, you should be bothered by these statistics. There’s simply no excuse for using an easy-to-crack password, for you or your team. Instead, it’s a good idea to make a password out of four random common words, splicing in a few special characters for good measure. To check the strength of your password, type it into HowSecureIsMyPassword.net before you make it official.

MALWARE

As described above, malware is often delivered through a shady phishing e-mail, but it’s not the only way it can wreak havoc on your system. An infected website (such as those you visit when you misspell sites like Facebook.com, a technique called “typosquatting”), a USB drive loaded with viruses or even an application can bring vicious software into your world without you even realizing it. In the past, an antivirus software was all that you needed. These days, it’s likely that you need a combination of software systems to combat these threats. These tools are not typically very expensive to put in place, especially considering the security holes they plug in your network.

SOCIAL ENGINEERING

As fallible as computers may be, they’ve got nothing on people. Sometimes hackers don’t need to touch a keyboard at all to break through your defenses: they can simply masquerade as you to a support team in order to get the team to activate a password reset. It’s easier than you think, and requires carefully watching what information you put on the Internet – don’t put the answers to your security questions out there for all to see.

We’ve outlined some of the simplest ways to defend yourself against these shady techniques, but honestly, the best way is to bring on a company that constantly keeps your system updated with the most cutting-edge security, is ready at a moment’s notice to protect you in a crisis, and can train your end-users. Hackers are going to come for you, but if you’ve done everything you can to prepare, your business will be safe. To discuss how Keller Schroeder can help you develop a comprehensive strategy to protect your business, contact your Keller Schroeder Account Manager today.

We are excited to announce our second quarter “Partnering Together In Business & Community Giveback” $500 donation recipient is Alive Hospice, nominated by Maria Conatser from Ingram Barge Company. Maria was recently joined at Ingram’s offices by Keller Schroeder’s Select Account Manager Lee Barron and Alive Hospice’s Judy Orr and Taylor Thurston to accept the donation. Thank you for partnering with us in giving Maria!

Keller Schroeder’s recent efforts to create relationships with new clients and prospects has extended an opportunity to partner with us, both in business and also in giving back to our community. Each quarter, we are holding a drawing for a $500 donation to a United Way-approved organization nominated by a prospective client we have recently met with.

Keller Schroeder is excited to announce the opening of our Nashville, TN office at 901 Woodland Street. The East Nashville office is the first hub outside of Evansville for Keller Schroeder since our founding in 1978.

Keller Schroeder has solid partnerships with Nashville-based businesses and technology partners. We have successfully supported a number of them from Evansville for several years. Our Nashville team has worked hard to gel with the local business and tech communities in Nashville, as well as the community at large. We’re excited about the message the opening of this office sends to our clients, partners, and prospects in Nashville. We know the close proximity will be a welcome benefit to them and to our team that serves them regularly.

As an employee-owned organization, Keller Schroeder exists to make positive, personal impacts on our employee-owners, clients, and the communities we serve. We’ve made positive impacts on many businesses in Nashville through our work. Through volunteering and giving back, we’ve impacted a number of community organizations in the region just as we have in Evansville. We are humbled by how we have been welcomed by the business leaders in Nashville, and are expecting great things to come out of our expansion there.